Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications

被引:0
|
作者
Marsalek, Alexander [1 ]
Kollmann, Christian [2 ]
Zefferer, Thomas [2 ]
Teufl, Peter [2 ]
机构
[1] Graz Univ Technol, IAIK, Graz, Austria
[2] A SIT Plus GmbH, Vienna, Austria
来源
2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC) | 2019年
关键词
Blockchain; Business integration; Middleware; Access control;
D O I
10.1109/bloc.2019.8751444
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Companies are eager to invest in the emerging blockchain technology, but often fail to integrate this technology into real-world business applications that go beyond cryptocurrencies or pure demonstrators. The reason often lies in specific requirements related to data security and privacy. Current blockchain solutions are not able to meet these requirements, preventing a broad adoption of blockchain technology in business applications. To tackle this problem, we introduce UBI: a Universal Blockchain Integrator. UBI acts as a middleware between a company's legacy IT infrastructure and off-the-shelf blockchain solutions. UBI enriches the functionality of these solutions so that they meet specific security and privacy requirements. Its successful implementation shows the feasibility of the proposed solution. First evaluation results demonstrate its potential for real-world business applications.
引用
收藏
页码:394 / 402
页数:9
相关论文
共 47 条
  • [1] Leveraging Intel SGX Technology to Protect Security-Sensitive Applications
    Sobchuk, Joseph
    O'Melia, Sean
    Utin, Daniil
    Khazan, Roger
    2018 IEEE 17TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2018,
  • [2] Model Checking of Security-Sensitive Business Processes
    Armando, Alessandro
    Ponta, Serena Elisa
    FORMAL ASPECTS IN SECURITY AND TRUST, 2010, 5983 : 66 - 80
  • [3] Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications
    Colesa, Adrian
    Lukacs, Sandor
    Topan, Vlad
    Ciocas, Radu
    Pop, Adrian
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 300 - 309
  • [4] Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes
    Compagna, Luca
    dos Santos, Daniel Ricardo
    Ponta, Serena Elisa
    Ranise, Silvio
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS (TACAS 2016), 2016, 9636 : 567 - 572
  • [5] WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications
    Barletta, Michele
    Calvi, Alberto
    Ranise, Silvio
    Vigano, Luca
    Zanetti, Luca
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 417 - 424
  • [6] Securing Display Path for Security-Sensitive Applications on Mobile Devices
    Cui, Jinhua
    Zhang, Yuanyuan
    Cai, Zhiping
    Liu, Anfeng
    Li, Yangyang
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (01): : 17 - 35
  • [7] Fast Switch into a Trustworthy Virtual Machine for Running Security-Sensitive Applications
    Pop, Adrian
    Colesa, Adrian
    Lutas, Andrei
    Gurzou, Alexandru
    Lukacs, Sandor
    Tos, Raul
    Ticle, Daniel
    2018 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR), 2018,
  • [8] Light-weight framework for security-sensitive wireless sensor networks applications
    Jokhio, Sana H.
    Jokhio, Imran Ali
    Kemp, Andrew H.
    IET WIRELESS SENSOR SYSTEMS, 2013, 3 (04) : 298 - 306
  • [9] Blockchain technology in the future of business cyber security and accounting
    Demirkan, Sebahattin
    Demirkan, Irem
    McKee, Andrew
    JOURNAL OF MANAGEMENT ANALYTICS, 2020, 7 (02) : 189 - 208
  • [10] Real Business Applications and Investments in Blockchain Technology
    Lage, Oscar
    Saiz-Santos, Maria
    Zarzuelo, Jose Manuel
    ELECTRONICS, 2022, 11 (03)